Advantech WebAccess Webeye ActiveX Control Stack Based Buffer Overflow Vulnerability

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host has an ActiveX control with a buffer overflow
vulnerability.

Description :

The Advantec WebAccess application installed on the remote host
includes a third party 'webeye.ocx' ActiveX control that is affected
by a stack-based buffer overflow vulnerability when processing input
to the 'ip_address' parameter. A remote attacker, using a specially
crafted HTML file, can exploit this to execute arbitrary code or crash
the application.

See also :

http://www.nessus.org/u?5e5be36d
https://ics-cert.us-cert.gov/advisories/ICSA-14-324-01
http://support.microsoft.com/kb/240797

Solution :

Upgrade WebAccess to version 8.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SCADA

Nessus Plugin ID: 81788 ()

Bugtraq ID: 71193

CVE ID: CVE-2014-8388

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now